CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:C/I:C/A:C
AI Score
Confidence
High
EPSS
Percentile
18.2%
NtImpersonateClientOfPort local procedure call in Windows NT 4.0 allows local users to gain privileges, aka “Spoofed LPC Port Request.”
Vendor | Product | Version | CPE |
---|---|---|---|
microsoft | windows_nt | 4.0 | cpe:2.3:o:microsoft:windows_nt:4.0:*:*:*:*:*:*:* |
microsoft | windows_nt | 4.0 | cpe:2.3:o:microsoft:windows_nt:4.0:sp1:*:*:*:*:*:* |
microsoft | windows_nt | 4.0 | cpe:2.3:o:microsoft:windows_nt:4.0:sp2:*:*:*:*:*:* |
microsoft | windows_nt | 4.0 | cpe:2.3:o:microsoft:windows_nt:4.0:sp3:*:*:*:*:*:* |
microsoft | windows_nt | 4.0 | cpe:2.3:o:microsoft:windows_nt:4.0:sp4:*:*:*:*:*:* |
microsoft | windows_nt | 4.0 | cpe:2.3:o:microsoft:windows_nt:4.0:sp5:*:*:*:*:*:* |
microsoft | windows_nt | 4.0 | cpe:2.3:o:microsoft:windows_nt:4.0:sp6:*:*:*:*:*:* |